• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

Women Political Leaders Summit targeted in RomCom malware phishing

Bill Toulas by Bill Toulas
October 16, 2023
Reading Time: 4 mins read
0
Women Political Leaders Summit targeted in RomCom malware phishing

Hacker jigsaw

RELATED POSTS

HTC Global Services confirms cyberattack after data leaked online

Multiple NFT collections at risk by flaw in open-source library

Kali Linux 2023.4 released with GNOME 45 and 15 new tools

A new, lightweight variant of the RomCom backdoor was deployed against participants of the Women Political Leaders (WPL) Summit in Brussels, a summit focusing on gender equality and women in politics.

The campaign used a fake website mimicking the official WPL portal to bait people seeking to attend or simply interested in the summit.

A Trend Micro report analyzing the new variant warns that its operators, tracked by the firm as ‘Void Rabisu,’ have been using a stealthier backdoor with a new TLS-enforcement technique in the C2 (command and control) communications to make discovery harder.

Also, the latest attack cements the group’s shift from opportunistic ransomware attacks previously attributed to a Cuba ransomware affiliate to high-level cyberespionage campaign involving the exploitation of zero-day vulnerabilities in Microsoft products.

Targeting women political leaders

In August 2023, Void Rabisu set up a malicious website on the address ‘wplsummit[.]com’, designed to imitate the real Women Political Leaders (WPL) website hosted on wplsummit.org.

Fake WPL Summit website
Fake WPL Summit website
Source: Trend Micro

The fake site linked to a OneDrive folder through a button named ‘Videos & photos,’ which contained pictures from the two days of the event, taken from the genuine site, and a malware downloader named ‘Unpublished Pictures.’

Buy JNews
ADVERTISEMENT
Files hosted on OneDrive
Files hosted on OneDrive (Trend Micro)

The malicious executable is signed by an Elbor LLC certificate and is a self-extracting archive containing 56 photos to act as decoys, while a second encrypted file is downloaded from a remote host.

Genuine images from the event are contained in the archive
Genuine images from the event are contained in the archive
Source: Trend Micro

The second payload is a DLL that is decrypted and loaded into memory to evade detection and continues to fetch additional components required for establishing communication with the attacker’s server.

XOR-encrypted payload
XOR-encrypted payload
Source: Trend Micro

RomCom 4.0

Trend Micro identifies the latest, stripped-down variant of RomCom as the fourth major release of the backdoor, explaining that it’s the same malware Volexity researchers recently named ‘Peapod.’

Compared to RomCom 3.0, the previous version seen in Void Rabisu operations, the new backdoor variant has undergone significant changes, making it lighter and stealthier.

It now supports only the following ten commands, a stark reduction from the previous 42.

  • No action – Handling function returns zero; malware waits for the next command.
  • Run command – Executes a command and sends back its output.
  • Upload file – Uploads a file to the compromised machine.
  • Download file – Retrieves a file from the infected machine.
  • Run command – Executes a given command.
  • Update interval – Modifies backdoor check frequency (default 60 seconds) and updates the system registry.
  • Get system info – Retrieves RAM, processor, local time, and username.
  • Update network component – Updates data for the network component in the Windows registry.
  • Uninstall – Purges relevant registry keys and deletes associated files.
  • Get service name from the Windows registry

Also, instead of utilizing modified MSIs to drop its components onto devices directly, the new variant leverages an EXE file to fetch XOR-encrypted DLLs, loading all its components in memory.

RomCom 4.0 has also incorporated new features related to Transport Layer Security (TLS), a protocol designed to provide secure communication with the C2 server.

The malware has been coded to force WinHTTP functions to specifically use the TLS version 1.2 rather than allowing the operating system to choose the default TLS version.

Default TLS versions on various Windows versions
Default TLS versions on various Windows versions
Source: Trend Micro

This enforcement system results in an error on Windows 7, which Trend Micro considers safe against the newest RomCom variant.

The goal of this mechanism is likely to make C2 communication more resistant to snooping, complicate automated discovery, and possibly allow attackers to filter out unsuitable victims.

In general, Void Rabisu’s tactics and the deployment of the RomCom malware remain cloudy. 

However, it is clear that the backdoor’s development is still ongoing, and its operators are increasingly focused on top-level cyber espionage.

Trend Micro concludes that it is very likely that Void Rabisu will target all big conferences related to special interest groups, so caution is advised when visiting event sites.

Share54Tweet34Pin12
Bill Toulas

Bill Toulas

Related Posts

HTC Global Services confirms cyberattack after data leaked online
Cyber Security

HTC Global Services confirms cyberattack after data leaked online

December 5, 2023
Multiple NFT collections at risk by flaw in open-source library
Cyber Security

Multiple NFT collections at risk by flaw in open-source library

December 5, 2023
Kali Linux 2023.4 released with GNOME 45 and 15 new tools
Cyber Security

Kali Linux 2023.4 released with GNOME 45 and 15 new tools

December 5, 2023
Microsoft to let Windows 10 home users buy Extended Security Updates
Cyber Security

Microsoft to let Windows 10 home users buy Extended Security Updates

December 5, 2023
Microsoft to let Windows 10 home users buy Extended Security Updates
Cyber Security

Microsoft to let Windows 10 home users buy Extended Security Updates

December 5, 2023
Microsoft to let Windows 10 home users buy Extended Security Updates
Cyber Security

Microsoft to let Windows 10 home users buy Extended Security Updates

December 5, 2023

Recommended Stories

The US Securing Open Source Software Act of 2022 is a step in the right direction

Flat is the new up, down is the new flat, dead is the new down

March 10, 2023
New York Attorney General Files Lawsuit Against Kucoin and Declares Ethereum a Security

New York Attorney General Files Lawsuit Against Kucoin and Declares Ethereum a Security

March 10, 2023

Facts and myths about the warriors who raided Europe and explored the New World

March 10, 2023

Popular Stories

  • Facts and myths about the warriors who raided Europe and explored the New World

    137 shares
    Share 55 Tweet 34
  • A Brief History of All the Women Who Have Won the Nobel Prize

    136 shares
    Share 54 Tweet 34
  • Will XRP make a comeback after the recent price decline? Data suggests…

    136 shares
    Share 54 Tweet 34
  • Gowalla returns to see if location-based networking is ready for its mainstream moment

    136 shares
    Share 54 Tweet 34
  • Saudi Arabia Seeks U.S. Security Pledges, Nuclear Help for Peace with Israel

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE »

Recent Posts

  • Ethereum spot ETF race heats up: This cohort takes an interest
  • Of SHIB’s surging burn rate and BONE’s role in it all
  • Should Blur investors be concerned about the dip in prices?

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?